8.6

CVE-2025-20263

A vulnerability in the web services interface of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a buffer overflow on an affected system. 

This vulnerability is due to insufficient boundary checks for specific data that is provided to the web services interface of an affected system. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected system. A successful exploit could allow the attacker to cause a buffer overflow condition on the affected system, which could cause the system to reload, resulting in a denial of service (DoS) condition.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerCisco
Produkt Cisco Adaptive Security Appliance (ASA) Software
Default Statusunknown
Version 9.12.3
Status affected
Version 9.8.3
Status affected
Version 9.12.1
Status affected
Version 9.8.1
Status affected
Version 9.12.2
Status affected
Version 9.8.2.45
Status affected
Version 9.8.2
Status affected
Version 9.8.4
Status affected
Version 9.14.1
Status affected
Version 9.12.4
Status affected
Version 9.8.2.26
Status affected
Version 9.8.2.24
Status affected
Version 9.8.2.15
Status affected
Version 9.8.2.14
Status affected
Version 9.8.2.35
Status affected
Version 9.8.2.20
Status affected
Version 9.8.2.8
Status affected
Version 9.8.2.17
Status affected
Version 9.8.2.28
Status affected
Version 9.8.2.33
Status affected
Version 9.8.2.38
Status affected
Version 9.8.4.25
Status affected
Version 9.12.3.2
Status affected
Version 9.12.3.7
Status affected
Version 9.8.3.18
Status affected
Version 9.8.3.14
Status affected
Version 9.8.4.15
Status affected
Version 9.8.4.8
Status affected
Version 9.8.1.7
Status affected
Version 9.8.3.29
Status affected
Version 9.14.1.10
Status affected
Version 9.12.2.5
Status affected
Version 9.8.4.22
Status affected
Version 9.12.3.12
Status affected
Version 9.8.4.7
Status affected
Version 9.8.4.17
Status affected
Version 9.8.3.16
Status affected
Version 9.8.4.20
Status affected
Version 9.8.3.11
Status affected
Version 9.12.1.3
Status affected
Version 9.8.4.3
Status affected
Version 9.12.2.4
Status affected
Version 9.8.4.12
Status affected
Version 9.12.1.2
Status affected
Version 9.8.3.26
Status affected
Version 9.8.1.5
Status affected
Version 9.12.2.9
Status affected
Version 9.12.3.9
Status affected
Version 9.8.3.21
Status affected
Version 9.8.4.10
Status affected
Version 9.12.2.1
Status affected
Version 9.12.4.2
Status affected
Version 9.14.1.6
Status affected
Version 9.8.3.8
Status affected
Version 9.14.1.15
Status affected
Version 9.14.1.19
Status affected
Version 9.8.4.26
Status affected
Version 9.12.4.4
Status affected
Version 9.14.1.30
Status affected
Version 9.8.4.29
Status affected
Version 9.12.4.7
Status affected
Version 9.14.2
Status affected
Version 9.12.4.8
Status affected
Version 9.8.4.32
Status affected
Version 9.12.4.10
Status affected
Version 9.14.2.4
Status affected
Version 9.14.2.8
Status affected
Version 9.12.4.13
Status affected
Version 9.8.4.33
Status affected
Version 9.14.2.13
Status affected
Version 9.8.4.34
Status affected
Version 9.12.4.18
Status affected
Version 9.8.4.35
Status affected
Version 9.14.2.15
Status affected
Version 9.12.4.24
Status affected
Version 9.16.1
Status affected
Version 9.8.4.39
Status affected
Version 9.14.3
Status affected
Version 9.12.4.26
Status affected
Version 9.16.1.28
Status affected
Version 9.14.3.1
Status affected
Version 9.12.4.29
Status affected
Version 9.14.3.9
Status affected
Version 9.16.2
Status affected
Version 9.12.4.30
Status affected
Version 9.16.2.3
Status affected
Version 9.8.4.40
Status affected
Version 9.14.3.11
Status affected
Version 9.12.4.35
Status affected
Version 9.8.4.41
Status affected
Version 9.14.3.13
Status affected
Version 9.16.2.7
Status affected
Version 9.12.4.37
Status affected
Version 9.14.3.15
Status affected
Version 9.17.1
Status affected
Version 9.16.2.11
Status affected
Version 9.14.3.18
Status affected
Version 9.16.2.13
Status affected
Version 9.12.4.39
Status affected
Version 9.12.4.38
Status affected
Version 9.8.4.43
Status affected
Version 9.14.4
Status affected
Version 9.16.2.14
Status affected
Version 9.17.1.7
Status affected
Version 9.12.4.40
Status affected
Version 9.16.3.3
Status affected
Version 9.14.4.6
Status affected
Version 9.16.3
Status affected
Version 9.16.3.14
Status affected
Version 9.17.1.9
Status affected
Version 9.14.4.7
Status affected
Version 9.12.4.41
Status affected
Version 9.17.1.10
Status affected
Version 9.8.4.44
Status affected
Version 9.18.1
Status affected
Version 9.12.4.47
Status affected
Version 9.14.4.12
Status affected
Version 9.16.3.15
Status affected
Version 9.18.1.3
Status affected
Version 9.17.1.11
Status affected
Version 9.12.4.48
Status affected
Version 9.14.4.13
Status affected
Version 9.18.2
Status affected
Version 9.16.3.19
Status affected
Version 9.17.1.13
Status affected
Version 9.12.4.50
Status affected
Version 9.14.4.14
Status affected
Version 9.17.1.15
Status affected
Version 9.8.4.45
Status affected
Version 9.12.4.52
Status affected
Version 9.14.4.15
Status affected
Version 9.16.3.23
Status affected
Version 9.18.2.5
Status affected
Version 9.16.4
Status affected
Version 9.12.4.54
Status affected
Version 9.14.4.17
Status affected
Version 9.8.4.46
Status affected
Version 9.17.1.20
Status affected
Version 9.18.2.7
Status affected
Version 9.19.1
Status affected
Version 9.16.4.9
Status affected
Version 9.12.4.55
Status affected
Version 9.18.2.8
Status affected
Version 9.14.4.22
Status affected
Version 9.16.4.14
Status affected
Version 9.8.4.48
Status affected
Version 9.18.3
Status affected
Version 9.19.1.5
Status affected
Version 9.14.4.23
Status affected
Version 9.12.4.56
Status affected
Version 9.16.4.18
Status affected
Version 9.17.1.30
Status affected
Version 9.19.1.9
Status affected
Version 9.18.3.39
Status affected
Version 9.16.4.19
Status affected
Version 9.12.4.58
Status affected
Version 9.19.1.12
Status affected
Version 9.18.3.46
Status affected
Version 9.16.4.27
Status affected
Version 9.19.1.18
Status affected
Version 9.18.3.53
Status affected
Version 9.18.3.55
Status affected
Version 9.16.4.38
Status affected
Version 9.17.1.33
Status affected
Version 9.12.4.62
Status affected
Version 9.16.4.39
Status affected
Version 9.18.3.56
Status affected
Version 9.20.1
Status affected
Version 9.16.4.42
Status affected
Version 9.19.1.22
Status affected
Version 9.18.4
Status affected
Version 9.20.1.5
Status affected
Version 9.18.4.5
Status affected
Version 9.19.1.24
Status affected
Version 9.16.4.48
Status affected
Version 9.18.4.8
Status affected
Version 9.20.2
Status affected
Version 9.19.1.27
Status affected
Version 9.12.4.65
Status affected
Version 9.16.4.55
Status affected
Version 9.18.4.22
Status affected
Version 9.20.2.10
Status affected
Version 9.16.4.57
Status affected
Version 9.19.1.28
Status affected
Version 9.17.1.39
Status affected
Version 9.12.4.67
Status affected
Version 9.14.4.24
Status affected
Version 9.18.4.24
Status affected
Version 9.20.2.21
Status affected
Version 9.16.4.61
Status affected
Version 9.19.1.31
Status affected
Version 9.18.4.29
Status affected
Version 9.20.2.22
Status affected
Version 9.16.4.62
Status affected
Version 9.18.4.34
Status affected
Version 9.20.3
Status affected
Version 9.16.4.67
Status affected
Version 9.16.4.70
Status affected
Version 9.18.4.40
Status affected
Version 9.22.1.1
Status affected
Version 9.16.4.71
Status affected
Version 9.20.3.4
Status affected
Version 9.18.4.47
Status affected
Version 9.20.3.7
Status affected
Version 9.17.1.45
Status affected
Version 9.19.1.37
Status affected
Version 9.17.1.46
Status affected
Version 9.16.4.76
Status affected
Version 9.20.3.9
Status affected
Version 9.19.1.38
Status affected
Version 9.18.4.50
Status affected
Version 9.22.1.3
Status affected
Version 9.20.3.10
Status affected
Version 9.22.1.2
Status affected
HerstellerCisco
Produkt Cisco Firepower Threat Defense Software
Default Statusunknown
Version 6.2.3.14
Status affected
Version 6.4.0.1
Status affected
Version 6.2.3.7
Status affected
Version 6.2.3
Status affected
Version 6.4.0.2
Status affected
Version 6.2.3.9
Status affected
Version 6.2.3.1
Status affected
Version 6.2.3.2
Status affected
Version 6.4.0.5
Status affected
Version 6.2.3.10
Status affected
Version 6.4.0
Status affected
Version 6.4.0.3
Status affected
Version 6.2.3.6
Status affected
Version 6.4.0.4
Status affected
Version 6.2.3.15
Status affected
Version 6.2.3.5
Status affected
Version 6.2.3.4
Status affected
Version 6.2.3.3
Status affected
Version 6.2.3.8
Status affected
Version 6.4.0.6
Status affected
Version 6.2.3.11
Status affected
Version 6.2.3.12
Status affected
Version 6.2.3.13
Status affected
Version 6.4.0.7
Status affected
Version 6.4.0.8
Status affected
Version 6.6.0
Status affected
Version 6.4.0.9
Status affected
Version 6.2.3.16
Status affected
Version 6.6.0.1
Status affected
Version 6.6.1
Status affected
Version 6.4.0.10
Status affected
Version 6.4.0.11
Status affected
Version 6.6.3
Status affected
Version 6.6.4
Status affected
Version 6.4.0.12
Status affected
Version 7.0.0
Status affected
Version 6.2.3.17
Status affected
Version 7.0.0.1
Status affected
Version 6.6.5
Status affected
Version 7.0.1
Status affected
Version 7.1.0
Status affected
Version 6.4.0.13
Status affected
Version 6.6.5.1
Status affected
Version 6.2.3.18
Status affected
Version 7.0.1.1
Status affected
Version 6.4.0.14
Status affected
Version 7.1.0.1
Status affected
Version 6.6.5.2
Status affected
Version 7.0.2
Status affected
Version 6.4.0.15
Status affected
Version 7.2.0
Status affected
Version 7.0.2.1
Status affected
Version 7.0.3
Status affected
Version 6.6.7
Status affected
Version 7.1.0.2
Status affected
Version 7.2.0.1
Status affected
Version 7.0.4
Status affected
Version 7.2.1
Status affected
Version 7.0.5
Status affected
Version 6.4.0.16
Status affected
Version 7.3.0
Status affected
Version 7.2.2
Status affected
Version 7.2.3
Status affected
Version 6.6.7.1
Status affected
Version 7.3.1
Status affected
Version 7.1.0.3
Status affected
Version 7.2.4
Status affected
Version 7.0.6
Status affected
Version 7.2.5
Status affected
Version 7.2.4.1
Status affected
Version 7.3.1.1
Status affected
Version 7.4.0
Status affected
Version 6.4.0.17
Status affected
Version 7.0.6.1
Status affected
Version 7.2.5.1
Status affected
Version 7.4.1
Status affected
Version 7.2.6
Status affected
Version 7.0.6.2
Status affected
Version 7.4.1.1
Status affected
Version 6.6.7.2
Status affected
Version 6.4.0.18
Status affected
Version 7.2.7
Status affected
Version 7.2.5.2
Status affected
Version 7.3.1.2
Status affected
Version 7.2.8
Status affected
Version 7.6.0
Status affected
Version 7.4.2
Status affected
Version 7.2.8.1
Status affected
Version 7.0.6.3
Status affected
Version 7.4.2.1
Status affected
Version 7.2.9
Status affected
Version 7.0.7
Status affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.16% 0.377
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
psirt@cisco.com 8.6 3.9 4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
CWE-680 Integer Overflow to Buffer Overflow

The product performs a calculation to determine how much memory to allocate, but an integer overflow can occur that causes less memory to be allocated than expected, leading to a buffer overflow.